UMTS | HSPA | HSPA+ and LTE Security Training

UMTS | HSPA | HSPA+ and LTE Security Training

Print Friendly, PDF & Email

Introduction:

UMTS | HSPA | HSPA+ and LTE Security Training Course Description

Having completed this UMTS | HSPA | HSPA+ and LTE Security Training course the participant will be able to understand how security is implemented, deployed and managed in UMTS | HSPA | HSPA+ and LTE networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.

Duration: 2 Days

UMTS | HSPA | HSPA+ and LTE Security Training
 
UMTS | HSPA | HSPA+ and LTE Security TrainingRelated Courses
 

Customize It:

• If you are familiar with some aspects of UMTS | HSPA | HSPA+ and LTE Security Training, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the UMTS | HSPA | HSPA+ and LTE Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the UMTS | HSPA | HSPA+ and LTE Security Training course in manner understandable to lay audiences.

Objectives:

After completing this UMTS | HSPA | HSPA+ and LTE Security Training course, attendees will be able to:

The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in UMTS/HSPA/HSPA+ radio and core network. The course focuses both on the security on the air interface and the core network.

UMTS | HSPA | HSPA+ and LTE Security Training – Course Outline:

Overview of Security Concepts

◾Basic security concepts
◾Authentication
◾Privacy
◾Integrity
◾Authorization
◾Non-repudiation

Encryption Fundamentals

◾Encryption Technologies
◾Cryptography Keys
◾Symmetric and Asymmetric
◾Ciphers
◾Cipher Suites
◾Certificates

Overview of Wireless Security Requirements

◾Wireless security needs
◾Basic GSM, GPRS and UMTS security functions

UMTS Security Architecture

◾Overview of UMTS Network
◾Overview of HSPA/HSPA+
◾UMTS security features
◾Network access mechanisms
◾UMTS authentication and authorization procedures
◾Key agreement
◾Local authentication
◾UMTS ciphering procedures
◾Security threats to UMTS
◾Security Evolution in E-UTRAN/LTE and EPC

Security in UTRAN

◾Typical threats in UTRAN
◾Mutual authentication
◾Cryptography for authentication
◾UTRAN encryption
◾Integrity protection of RRC signalling
◾Security in E-UTRAN

Security in UMTS Core Network

◾Typical Threats in Core Network
◾Denial of Services
◾IPSec
◾Authentication Server
◾Network Domain
◾MAP application layer security

UMTS Authentication and Key Management (AKA)

◾Authentication parameters
◾AV and K
◾RAND
◾SQN and AK
◾AMF and MAC
◾CK and IK
◾RES and X-RES
◾AUTN and AUTS
◾Normal AKA procedure
◾AKA procedure in the AuC
◾AKA procedure in the USIM
◾AKA procedure in the VLR/SGSN

AKA Algorithms

◾AKA Functions with their outputs
◾Cryptographic functions and algorithms
◾Key generating functions
◾Authentication parameters
◾Integrity function
◾Confidentiality function
◾f0, f1 and f1*
◾f2, f3 and f4
◾f5, f5*, f8 and f9

Whether you are looking for general information or have a specific question, we want to help!

 
Request More Information

    Time frame:

    0